dc.contributor.author | Das Chowdhury, P. | |
dc.contributor.author | Malcolm, J. | |
dc.contributor.author | Christianson, B. | |
dc.date.accessioned | 2009-04-07T08:18:01Z | |
dc.date.available | 2009-04-07T08:18:01Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Das Chowdhury , P , Malcolm , J & Christianson , B 2006 , ' Anonymous authentication ' , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , no. Security Protocols , pp. 299-305 . https://doi.org/10.1007/11861386_36 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | PURE: 88083 | |
dc.identifier.other | PURE UUID: fd9602df-1002-41d3-b8e2-a0192e83d428 | |
dc.identifier.other | dspace: 2299/3139 | |
dc.identifier.uri | http://hdl.handle.net/2299/3139 | |
dc.description | “The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA] | |
dc.description.abstract | The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate the protocol with an example of authorization in a role based access mechanism. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.title | Anonymous authentication | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Science & Technology Research Institute | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | https://doi.org/10.1007/11861386_36 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |